Automated Risk Management System and Method
An automated risk management system connected to a computer network for use by a organization includes a server connected to the network, the server having a memory configured to store programming and data structures. The system includes a processor connected to the server and memory that is configured to execute the programming. The memory includes process flowchart data indicative of a organization's process objectives and controls. The memory may include regulatory data indicative of current regulations affecting the organization and risk assessment data indicative of potential risks, impacts, and likelihood of occurrence to the business. The system includes programming that automatically initiates searches of the internet using current process, regulatory, or risk assessment data and stores the search results in memory. Current data and search result data may be output to prompt a comparison of the same and, thus, require efficient management of potential risks.
This invention relates generally to risk management systems and, more particularly, to an automated risk management system that not only documents an organization's risk management program but proactively provides consultation by utilizing connection to the internet to determine improvements to processes, learn lessons from risks experienced by other organizations, and receive advance notice of new or coming regulations.
Risk management refers generally to the identification and assessment of events within an organization or agency that may yield negative impacts and then to implement procedures for managing those risks. Risk management frequently includes detailed flowcharts that identify specific processes or procedures within an organization and which can be regularly reviewed, updated based on past events, or used for training purposes. Unfortunately, updates to process flowcharts are often the result of a negative occurrence that reveals a risk that was not properly managed and which had a negative impact on the organization. Negative impacts may include financial loss, litigation, embarrassment of the organization or individuals, or even death.
Although risk management methods and systems are well known in the art, they almost always operate on hindsight experience rather than by proactively or consistently looking forward based on the newest information from regulatory agencies or the experience of other similar organizations.
Therefore, it would be desirable to have an automated risk management system that not only documents process flowcharts but that automatically searches the internet for articles or other data related to those flowcharts for the risk manager or committee to review. Further, it would be desirable to have an automated risk management system that searches the internet for the latest industry regulations or statutes based on known current regulations. In addition, it would be desirable to have an automated risk management system that is accessible online to a risk manager of an organization.
SUMMARY OF THE INVENTIONAn automated risk management system connected to a computer network for use by an organization according to the present invention includes a server electrically connected to the computer network, the server having a memory configured to store programming and data structures. The system includes a processor electrically connected to the server and to the memory that is configured to execute the programming. The memory includes process flowchart data indicative of an organization's process objectives and controls. The memory may include regulatory data indicative of current regulations affecting the organization. The memory may include risk assessment data indicative of potential risks, impacts, and likelihood of occurrence to the business.
The system includes programming that automatically initiates searches of the internet using process, regulatory, or risk assessment data and stores the search results in memory. Current data and search result data may be output to prompt a comparison of the same and, thus, require management of potential risks.
Therefore, a general object of this invention is to provide an automated risk management system that not only provides documentation of an organization's risk management processes and data but also provides automated consultation from relevant industries or regulatory agencies.
Another object of this invention is to provide an automated risk management system, as aforesaid, in which the automatic consulting data is derived from automatic internet searches based on current data stored in system relative to a respective organization.
Still another object of this invention is to provide an automated risk management system, as aforesaid, that imports process flowcharts created in other software and then automatically assigns predetermined objectives and controls to the flowchart data.
Yet another object of this invention is to provide an automatic risk management system, as aforesaid, that automatically assigns significance, type, and design ratios to a user input likelihood and impact risk assessment matrix.
A further object of this invention is to provide an automated risk management system, as aforesaid, that automatically searches the internet for articles and other data regarding compliance breaches and control breaks from similar industries so as to recommend proactive improvement to the organization's processes and controls.
A still further object of this invention is to provide an automated risk management system, as aforesaid, that brings all results of the system's components together at predetermined times to “force” evaluation of risk management controls and risks.
A still further object of this invention is to provide an automated risk management system, as aforesaid, that automatically searches relevant regulatory agencies or trade associations at predetermined times for updated or upcoming regulations that may impact the organization.
Other objects and advantages of the present invention will become apparent from the following description taken in connection with the accompanying drawings, wherein is set forth by way of illustration and example, embodiments of this invention.
An automated risk management system according to a preferred embodiment of the present invention will be described in detail with reference to
The server 12 is illustrated as a collection of its components in
The risk management system 10 includes a methodology defined by its software. The memory 38 includes various types of data that may be amended or edited by an authorized user. The first step in the process, then, is to authenticate any user attempting to access the system. The steps of authenticating a user of the system 10 is well known, such as through entry and verification of a username and password (not shown).
A process according to the present invention includes multiple “modes” or sub-processes (
The overall process 50 is initiated as shown in
Process 100 illustrated in
Process 200 illustrated in
The process 200 then proceeds to step 212 at which the processor 20 determines if the user desires to add another level of severity to the current risk. In other words, the user may choose to indicate another possible impact and severity level relative to same risk as previously entered. If so, the process 200 returns to step 208; otherwise, control is passed to step 214. At step 214, the processor determines if the user desires to enter a completely new risk with its corresponding impacts/likelihood data. If so, the process 200 returns to step 206 at which a new risk may be entered as described above. Otherwise, the process 200 proceeds to step 216. At step 216, the processor 20 automatically calculates statistics based on the quantitative indications of likelihood and severity of impact of each risk or the overall risk matrix. Each matrix, associated data, and statistics are stored in the risk database 32 in memory 26. These statistics may be retrieved by another aspect of the system 10 as will be described later. Process 200 then returns to step 202 to determine if another risk assessment is desired. If not, control is returned to step 52 of process 50 illustrated in
Turning again to
Further, the processor 62 may access memory 26 and submit terms from the process database 30 to the search engine. It is understood that predetermined search engines may be used rather than a general search engine, such as one that allows searching only for published articles, trade papers, predetermined blog sites, etc. The process 50 proceeds to step 64 sequentially or in parallel with step 62. Specifically, the processor 20 may access the risk database 32 and submit particular terms to the search engine. It is understood that a user may have designated particular terms be used in automatic searches and these designations were saved in particular memory addresses. After the internet searches at steps 62 and 64, the process 50 proceeds to step 66 at which the search results may be immediately delivered to a risk manager or stored to the search result database 34 at step 68. The process 50 then proceeds to step 70.
At step 70, the processor 20 determines if a user desires to engage process 400 for “Regulatory Oversight and Compliance Kit” (“ROCK”). If so, the process 50 transfers control to process 300 which is illustrated in
Again with reference to
It is understood that while certain forms of this invention have been illustrated and described, it is not limited thereto except insofar as such limitations are included in the following claims and allowable functional equivalents thereof.
Claims
1. An automated risk management system connected to a computer network for use by a organization, comprising:
- a server electrically connected to the computer network, said server having a memory configured to store programming and data structures;
- a processor situated in said server and electrically connected said memory that is configured to execute said programming;
- wherein said memory includes process flowchart data indicative of a organization's process objectives and controls;
- wherein said memory includes search result data received from automatic internet searches;
- programming in said memory that, when executed by said processor, causes said processor to: automatically initiate at least one search to a search engine over the computer network at a predetermined time using said process flowchart data stored in said memory; and store a result of said process flowchart data search in said memory.
2. The automated risk management system as in claim 1, comprising programming in said memory that, when executed by said processor, causes said processor to allow a user in communication with said computer network to access said server after credential authentication.
3. The automated risk management system as in claim 1, comprising programming in said memory that, when executed by said processor, causes said processor to:
- receive said flowchart data input by a user; and
- store said process flowchart data in said memory.
4. The automated risk management system as in claim 3, further comprising programming in said memory that, when executed by said processor, causes said processor to automatically associate predetermined objectives and process controls to said flowchart data input by said user.
5. The automated risk management system as in claim 4, comprising programming in said memory that, when executed by said processor, causes said processor to:
- receive current regulatory data input by a user, said regulatory data being indicative of current regulations affecting the organization; and
- store said current regulatory data in said memory.
6. The automated risk management system as in claim 1, comprising programming in said memory that, when executed by said processor, causes said processor to:
- receive current regulatory data input by a user, said regulatory data being indicative of current regulations affecting the organization; and
- store said current regulatory data in said memory.
7. The automated risk management system as in claim 6, comprising programming in said memory that, when executed by said processor, causes said processor to:
- automatically initiate at least one search to a search engine over the computer network at a predetermined time using said current regulatory data stored in said memory; and
- store a result of said current regulatory data search in said memory.
8. The automated risk management system as in claim 5, comprising:
- programming in said memory that, when executed by said processor, causes said processor to: automatically initiate at least one search to a search engine over the computer network at a predetermined time using said current regulatory data stored in said memory; and store a result of said current regulatory data search in said memory.
9. The automated risk management system as in claim 1, comprising programming in said memory that, when executed by said processor, causes said processor to receive risk assessment data input by a user and store said risk assessment data in said memory.
10. The automated risk management system as in claim 9, wherein said risk assessment data includes impact data and likelihood of occurrence data; and
- said automated risk management system including programming in said memory that, when executed by said processor, causes said processor to calculate significance of risk ratios based on said impact data and likelihood of occurrence data.
11. The automated risk management system as in claim 9, comprising programming in said memory that, when executed by said processor, causes said processor to:
- automatically initiate at least one search to a search engine over the computer network at a predetermined time using said risk assessment data stored in said memory; and
- store a result of said risk assessment data search in said memory.
12. The automated risk management system as in claim 11, wherein said memory includes a risk database configured to store said risk assessment data.
13. The automated risk management system as in claim 7, wherein said memory includes:
- a process database configured to store said process flowchart data;
- a search result database configured to store said result of said process flowchart data search; and
- a regulatory data configured to store said result of said current regulatory data search.
14. The automated risk management system as in claim 7, comprising programming in said memory that, when executed by said processor, causes said processor to receive risk assessment data input by a user and store said risk assessment data in said memory, wherein said risk assessment data includes impact data and likelihood of occurrence data;
- wherein said automated risk management system includes programming in said memory that, when executed by said processor, causes said processor to: calculate significance of risk ratios based on said impact data and likelihood of occurrence data; automatically initiate at least one search to a search engine over the computer network at a predetermined time using said risk assessment data stored in said memory; and store a result of said risk assessment data search in said memory; output said process flowchart data, said process flowchart data search result, said current regulatory data result, and said risk assessment data search result.
15. An automated risk management system connected to a computer network for use by a organization, comprising:
- a server electrically connected to the computer network, said server having a memory configured to store programming and data structures;
- a processor in said sever and electrically connected to said memory that is configured to execute said programming;
- a regulatory database stored in said memory that includes regulatory data being indicative of current regulations affecting the organization;
- a search result database located in said memory that includes search data received from automatic internet searches;
- programming in said memory that, when executed by said processor, causes said processor to: automatically initiate at least one search to a search engine over the computer network at a predetermined time using said regulatory data stored in said regulatory database; and store a result of said regulatory data search in said search result database.
16. The automated risk management system as in claim 15, comprising programming in said memory that, when executed by said processor, causes said processor to:
- receive current regulatory data input by a user and store said input data in said regulatory database, said regulatory data being indicative of current regulations affecting the organization; and
- store said current regulatory data in said regulatory database.
17. The automated risk management system as in claim 15, comprising:
- wherein said memory includes a process database having process flowchart data indicative of a organization's process objectives and controls;
- programming in said memory that, when executed by said processor, causes said processor to: automatically initiate at least one search to a search engine over the computer network at a predetermined time using said process flowchart data stored in said process database; and store a result of said process flowchart data search in said search result database.
18. The automated risk management system as in claim 17, comprising programming in said memory that, when executed by said processor, causes said processor to:
- receive said flowchart data input by a user;
- store said process flowchart data in said memory;
- automatically associate predetermined objectives and process controls to said flowchart data input by said user.
19. The automated risk management system as in claim 18, causes said processor to receive risk assessment data input by a user and store said risk assessment data in said memory.
20. The automated risk management system as in claim 15, causes said processor to receive risk assessment data input by a user and store said risk assessment data in said memory.
21. The automated risk management system as in claim 20, wherein said risk assessment data includes impact data and likelihood of occurrence data; and
- said automated risk management system comprising programming in said memory that, when executed by said processor, causes said processor to calculate significance of risk ratios based on said impact data and said likelihood of occurrence data.
22. The automated risk management system as in claim 21, comprising programming in said memory that, when executed by said processor, causes said processor to:
- automatically initiate at least one search to a search engine over the computer network at a predetermined time using said risk assessment data stored in said memory; and
- store a result of said risk assessment data search in said search result database.
23. The automated risk management system as in claim 15, wherein said memory includes a risk database configured to store said risk assessment data.
24. The automated risk management system as in claim 22, comprising programming that when executed causes said processor to output said current regulatory data search result and said risk assessment data search result.
25. A method for automatically managing risk of a organization using a computer connected to the internet and having an input, comprising:
- providing an electronic memory having data structures configured to store process flowchart data indicative of a organization's process objectives;
- automatically initiating a search of the internet at a predetermined time using said flowchart data;
- storing a result of said flowchart data search in said memory; and
- outputting said flowchart data search result and said flowchart data for comparison.
26. The method for automatically managing risk as in claim 25, further comprising:
- receiving said process flowchart data input by a user;
- storing said input process flowchart data in said memory; and
- automatically associate predetermined objectives and controls with said input process flowchart data.
27. The method for automatically managing risk as in claim 25, wherein said memory includes regulatory data being indicative of current regulations affecting the organization.
28. The method for automatically managing risk as in claim 25, comprising:
- receive current regulatory data input by a user, said regulatory data being indicative of current regulations affecting the organization;
- storing said input regulatory data in said memory;
- automatically initiating a search of the internet at a predetermined time using said current regulatory data;
- storing a result of said current regulatory data search in said memory; and
- outputting said current regulatory data and said current regulatory data search result so that a comparison is selectively made.
29. The method for automatically managing risk as in claim 25, wherein said memory includes data structures for storing risk assessment data indicative of impact data and likelihood of occurrence data;
- said method for automatically managing risk includes: receiving said risk assessment data input by a user; storing said risk assessment data in said memory; automatically initiating at least one search to a search engine over the computer network at a predetermined time using said risk assessment data stored in said memory; and storing a result of said risk assessment data search in said search result database.
30. The method for automatically managing risk as in claim 29, comprising outputting said risk assessment data and said risk assessment data search result so as to facilitate a comparison thereof.
Type: Application
Filed: Feb 18, 2013
Publication Date: Aug 21, 2014
Inventor: Tamika M. Baker (San Antonio, TX)
Application Number: 13/769,692